Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.21.75.2 spam
Spammer blacklist in https://www.projecthoneypot.org/ip_104.21.75.2 https://multirbl.valli.org/lookup/104.21.75.2.html
2022-12-29 00:00:44
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.21.75.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11447
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.21.75.53.			IN	A

;; AUTHORITY SECTION:
.			273	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 10:19:26 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 53.75.21.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.75.21.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
42.118.219.173 attackspam
Unauthorized connection attempt detected from IP address 42.118.219.173 to port 445
2019-12-31 03:45:26
95.192.247.104 attackspambots
diesunddas.net 95.192.247.104 [30/Dec/2019:15:44:42 +0100] "POST /xmlrpc.php HTTP/1.0" 301 495 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36"
diesunddas.net 95.192.247.104 [30/Dec/2019:15:44:44 +0100] "POST /xmlrpc.php HTTP/1.0" 200 3643 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36"
2019-12-31 03:51:30
42.114.21.19 attack
Unauthorized connection attempt detected from IP address 42.114.21.19 to port 445
2019-12-31 03:46:30
118.68.122.74 attackbots
Unauthorized connection attempt detected from IP address 118.68.122.74 to port 445
2019-12-31 03:33:09
92.50.133.22 attack
Unauthorized connection attempt detected from IP address 92.50.133.22 to port 445
2019-12-31 03:39:39
42.117.20.110 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-31 04:07:25
187.189.109.138 attackbots
2019-12-13T09:25:53.644721suse-nuc sshd[22310]: Invalid user kerner from 187.189.109.138 port 37252
...
2019-12-31 03:55:02
222.186.175.182 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Failed password for root from 222.186.175.182 port 47080 ssh2
Failed password for root from 222.186.175.182 port 47080 ssh2
Failed password for root from 222.186.175.182 port 47080 ssh2
Failed password for root from 222.186.175.182 port 47080 ssh2
2019-12-31 04:05:33
116.247.101.206 attackspambots
ssh brute force
2019-12-31 04:04:51
117.50.6.160 attackbotsspam
Unauthorized connection attempt detected from IP address 117.50.6.160 to port 993
2019-12-31 03:34:07
110.243.13.171 attackbots
Fail2Ban Ban Triggered
2019-12-31 04:02:24
27.3.121.3 attack
Unauthorized connection attempt detected from IP address 27.3.121.3 to port 445
2019-12-31 03:48:49
47.105.86.68 attack
Unauthorized connection attempt detected from IP address 47.105.86.68 to port 23
2019-12-31 03:44:08
61.144.97.205 attackspambots
Unauthorized connection attempt detected from IP address 61.144.97.205 to port 445
2019-12-31 03:41:29
113.140.29.46 attackspambots
Unauthorized connection attempt detected from IP address 113.140.29.46 to port 445
2019-12-31 03:35:50

Recently Reported IPs

104.21.75.234 104.21.75.72 104.21.75.60 104.21.75.66
104.21.75.90 104.21.75.74 13.225.71.81 104.21.76.131
104.21.76.102 104.21.75.98 104.21.76.121 104.21.76.112
104.21.76.118 104.21.76.137 104.21.76.159 104.21.76.142
104.21.76.157 104.21.76.162 104.21.76.173 104.21.76.227